Analysis
-
max time kernel
143s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 23:51
Behavioral task
behavioral1
Sample
7dbfe704ef6228a629a284c93851d0fb1900e98e59ebb1bae6e6f9c64aaa7429.dll
Resource
win7-20240903-en
General
-
Target
7dbfe704ef6228a629a284c93851d0fb1900e98e59ebb1bae6e6f9c64aaa7429.dll
-
Size
80KB
-
MD5
b4e97df33272c901130e93485c5361db
-
SHA1
3ecfcabdbeda349f7b3d6be73ad2599f39dd8469
-
SHA256
7dbfe704ef6228a629a284c93851d0fb1900e98e59ebb1bae6e6f9c64aaa7429
-
SHA512
808a7ff601408c4e7f986a22a96e2ba2b360ccf87e6fd8d5985e7f90aa961e93f040ab432baaf256f6b399d8389310cb8d4adee7165db4d8da0bb58b986dfe05
-
SSDEEP
1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEzX0Du:5dbwovEVyqgoZmZXWfIdQdRaefP81
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 5 2288 rundll32.exe 8 2288 rundll32.exe 9 2288 rundll32.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: rundll32.exe -
pid Process 2820 arp.exe 1240 arp.exe 2940 arp.exe 2192 arp.exe 2752 arp.exe 2188 arp.exe 1564 arp.exe 2760 arp.exe 2808 arp.exe -
resource yara_rule behavioral1/memory/2288-2-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2288-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1240-3-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1240-4-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2940-12-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2192-9-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2192-5-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2940-7-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2752-22-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2820-23-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2820-27-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2760-26-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2808-20-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1564-18-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2760-16-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1564-15-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2752-14-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2188-6-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2808-13-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2288-29-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2036-31-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2036-33-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2288-34-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2288-41-0x0000000010000000-0x0000000010033000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2288 rundll32.exe 2288 rundll32.exe 2288 rundll32.exe 2288 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 480 Process not Found 480 Process not Found -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2288 rundll32.exe Token: SeDebugPrivilege 1240 arp.exe Token: SeDebugPrivilege 2192 arp.exe Token: SeDebugPrivilege 2188 arp.exe Token: SeDebugPrivilege 2940 arp.exe Token: SeDebugPrivilege 2808 arp.exe Token: SeDebugPrivilege 2820 arp.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2288 2692 rundll32.exe 30 PID 2692 wrote to memory of 2288 2692 rundll32.exe 30 PID 2692 wrote to memory of 2288 2692 rundll32.exe 30 PID 2692 wrote to memory of 2288 2692 rundll32.exe 30 PID 2692 wrote to memory of 2288 2692 rundll32.exe 30 PID 2692 wrote to memory of 2288 2692 rundll32.exe 30 PID 2692 wrote to memory of 2288 2692 rundll32.exe 30 PID 2288 wrote to memory of 1240 2288 rundll32.exe 31 PID 2288 wrote to memory of 1240 2288 rundll32.exe 31 PID 2288 wrote to memory of 1240 2288 rundll32.exe 31 PID 2288 wrote to memory of 1240 2288 rundll32.exe 31 PID 2288 wrote to memory of 2940 2288 rundll32.exe 33 PID 2288 wrote to memory of 2940 2288 rundll32.exe 33 PID 2288 wrote to memory of 2940 2288 rundll32.exe 33 PID 2288 wrote to memory of 2940 2288 rundll32.exe 33 PID 2288 wrote to memory of 2192 2288 rundll32.exe 34 PID 2288 wrote to memory of 2192 2288 rundll32.exe 34 PID 2288 wrote to memory of 2192 2288 rundll32.exe 34 PID 2288 wrote to memory of 2192 2288 rundll32.exe 34 PID 2288 wrote to memory of 2188 2288 rundll32.exe 36 PID 2288 wrote to memory of 2188 2288 rundll32.exe 36 PID 2288 wrote to memory of 2188 2288 rundll32.exe 36 PID 2288 wrote to memory of 2188 2288 rundll32.exe 36 PID 2288 wrote to memory of 1564 2288 rundll32.exe 37 PID 2288 wrote to memory of 1564 2288 rundll32.exe 37 PID 2288 wrote to memory of 1564 2288 rundll32.exe 37 PID 2288 wrote to memory of 1564 2288 rundll32.exe 37 PID 2288 wrote to memory of 2752 2288 rundll32.exe 40 PID 2288 wrote to memory of 2752 2288 rundll32.exe 40 PID 2288 wrote to memory of 2752 2288 rundll32.exe 40 PID 2288 wrote to memory of 2752 2288 rundll32.exe 40 PID 2288 wrote to memory of 2760 2288 rundll32.exe 41 PID 2288 wrote to memory of 2760 2288 rundll32.exe 41 PID 2288 wrote to memory of 2760 2288 rundll32.exe 41 PID 2288 wrote to memory of 2760 2288 rundll32.exe 41 PID 2288 wrote to memory of 2808 2288 rundll32.exe 42 PID 2288 wrote to memory of 2808 2288 rundll32.exe 42 PID 2288 wrote to memory of 2808 2288 rundll32.exe 42 PID 2288 wrote to memory of 2808 2288 rundll32.exe 42 PID 2288 wrote to memory of 2820 2288 rundll32.exe 43 PID 2288 wrote to memory of 2820 2288 rundll32.exe 43 PID 2288 wrote to memory of 2820 2288 rundll32.exe 43 PID 2288 wrote to memory of 2820 2288 rundll32.exe 43 PID 2288 wrote to memory of 2036 2288 rundll32.exe 49 PID 2288 wrote to memory of 2036 2288 rundll32.exe 49 PID 2288 wrote to memory of 2036 2288 rundll32.exe 49 PID 2288 wrote to memory of 2036 2288 rundll32.exe 49
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7dbfe704ef6228a629a284c93851d0fb1900e98e59ebb1bae6e6f9c64aaa7429.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7dbfe704ef6228a629a284c93851d0fb1900e98e59ebb1bae6e6f9c64aaa7429.dll,#12⤵
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 d2-2d-13-38-9d-493⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 47-84-ac-f0-80-363⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\Windows\SysWOW64\arp.exearp -s 136.243.69.123 db-f7-d9-41-cf-ca3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 fa-40-4c-69-6b-a13⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1564
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 b7-64-8d-b6-9f-ba3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2752
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 6c-ad-7e-34-bb-6b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2760
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 94-89-e4-ff-cf-fc3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 b3-bd-2b-d4-fd-b43⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Windows\SysWOW64\arp.exearp -d3⤵
- System Location Discovery: System Language Discovery
PID:2036
-
-